2022
DOI: 10.1002/rnc.6054
|View full text |Cite
|
Sign up to set email alerts
|

Observer‐based event‐triggered secure synchronization control for multi‐agent systems under false data injection attacks

Abstract: In this article, the observer-based event-triggered robust secure synchronization control problem is studied for multi-agent systems (MASs) under a directed graph and false data injection (FDI) attacks. During the information transmission, both control signals and measurement signals may be changed by false data, and the Bernoulli processes are used to describe FDI attacks that occur randomly on the sensor-to-controller and the controller-to-actuator transmission channels. A new event-triggered mechanism with … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…Remark Over the past years, the consensus problem of distributed CPSs has been investigated over an infinite‐horizon in References 18 and 27. For time‐varying distributed CPSs addressed in this paper, it makes sense to deal with the finite‐horizon H$$ {H}_{\infty } $$ consensus problem for distributed CPSs with hope to mitigate the effect from disturbances over a finite horizon.…”
Section: Problem Formulation and Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…Remark Over the past years, the consensus problem of distributed CPSs has been investigated over an infinite‐horizon in References 18 and 27. For time‐varying distributed CPSs addressed in this paper, it makes sense to deal with the finite‐horizon H$$ {H}_{\infty } $$ consensus problem for distributed CPSs with hope to mitigate the effect from disturbances over a finite horizon.…”
Section: Problem Formulation and Preliminariesmentioning
confidence: 99%
“…14 In this case, considerable research efforts have been made on developing efficient control and filtering algorithms for CPSs against deception attacks. [15][16][17][18][19] Note that, replay attack, as one specific type of deception attack is more common and easier to implement. So far, only a few results have investigated the security control problem of replay attacks due to the difficulty in modeling replay attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, it is significant to investigate the nonsingular prescribed-time leader-following formation control problem because there always exist measurement errors in the onboard measuring elements of the agents. 26 As an effective way to deal with system uncertainties and external disturbances, sliding mode control (SMC) has been widely studied and highly evaluated over the past few decades. 27 The existing advanced SMC methods can be mainly classified into three categories: TSMC, 28,29 dynamic SMC (DSMC), 30 and integral SMC (ISMC).…”
Section: Introductionmentioning
confidence: 99%
“…If the controllers utilize the gain that grows unbounded, the singularity‐like problem may arise. Thus, it is significant to investigate the nonsingular prescribed‐time leader‐following formation control problem because there always exist measurement errors in the onboard measuring elements of the agents 26 …”
Section: Introductionmentioning
confidence: 99%